Risk
6/14/2010
11:53 PM
50%
50%

Ipswitch Acquires MessageWay In Merger Of Managed File Transfer Vendors

Acquisition will pave the way for more secure application-to-application communications, partners say

Ipswitch, a maker of secure, managed file transfer products and services, on Tuesday will announce it has acquired MessageWay Solutions, a provider of managed file transfer and business integration solutions.

Terms of the deal were not disclosed.

With the addition of MessageWay to its product family, Ipswitch will provide a wide range of secure file transfer services and capabilities, including of advanced analytics, enterprisewide monitoring, and high-performance data translation and transformation for EDI, ERP, and a variety of other message formats, the companies said.

"When people in the industry talk about security, one of the things that they don't often mention is that about 80 percent of the exchanges that go on between companies are exchanges of files between applications, not between people sitting at a desk typing at a computer," says Greg Faubert, president of MessageWay. "This is an area that's becoming more important all the time."

"The file transfer market is changing, not only in the volume and size of messages, but in the way they are handled," says Gary Shottes, president of Ipswitch. "The worlds of managed file transfer, EDI, and middleware, which have typically been handled by different vendors, are converging. We think we'll be in a position to take market share away from all of those more focused players, by offering solutions that provide a more integrated approach." The need for managed file transfer is increasing as organizations look for ways to meet industry and regulatory requirements, such as SOX, PCI, FISMA, and HIPAA, the executives said. Many enterprises need a better way to show a "chain of custody" on file transfers, proving to auditors that data is safe as it travels between partners.

"What we offer is the ability to exchange files securely through the DMZ without the file ever landing on disk," Faubert says. "Companies can submit files or retrieve files through an open protocol, but without the file ever residing in the red zone.

"Once the data gets to its destination, it's encrypted and housed in a secure database," Faubert explains. "The only way for an attacker to get into those files would be for them to have access to the physical disk, all of the encryption keys, and a copy of our software."

Ipswitch expects its combined offerings to get traction in industries where secure file transfer is required, such as financial services, government, and healthcare.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.